Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
As presented at this year's RSA Conference, a 2016 survey of critical infrastructure companies and officials demonstrates that this scenario could be reality. Jay and Julia will take you through the spine-chilling specifics of why the nation's critical infrastructure is at an ever increased risk of cyber attacks as hackers make them their prime target.
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
This paper discusses the emerging issue of Board of Directors Governance and Cybersecurity. Originally presented to the Boards of Directors of the IRC http://www.isorto.org/Pages/Home in May 2014. The paper is in a continuous improvement mode ultimately targeting being a resource for Boards of Directors in the energy (electricity and natural gas) industry. Suggested updates and improvements are welcome at PaulFeldman@Gmail.com The current copy is always at http://www.EnergyCollection.us/456.pdf
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
-The Current Global Digital Threat Climate
-Cyber-Trends Against The U.S. Financial Service Sector
-Considerations Prior To Outsourcing
-Pitfalls In International Partnerships
-Communications, Connections, And Security Considerations Between Locations
-Dealing With Data Exposures
-5 Things You Can Do To Protect Your Existing Outsourcing Right Now
Session 2 10:30am-11:30am
-Technology Outsourcing Trends
-Secure Outsourcing Technologies
-Collaboration Methods With Remote Teams
-How To Connect People With The Right Information At The Right Time And The Right Place
-How To Connect People With Fellow Employees, Vendors, Partners Or Other External Contacts Outside Of the Organization
-Project Management Technology Of Remote Resources
A business's network assets are critical to its success. Despite their overwhelming importance, however, too many businesses leave those assets to chance.
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...Levi Shapiro
Presentation by Mary Alice Annecharico, former CIO, Henry Ford Health System: Cyber Risk in Healthcare. Some of the issues discussed include Building a Culture of Confidentiality, Executive leadership engagement, Board of Director sponsorship, Institutional Stressors that encircle all cyber-risk issues, the Clinical mission, CMS cuts, Revenue downturns, budget cuts, availability of funding for priorities. Assessing and Managing Cyber-risk, etc.
As presented at this year's RSA Conference, a 2016 survey of critical infrastructure companies and officials demonstrates that this scenario could be reality. Jay and Julia will take you through the spine-chilling specifics of why the nation's critical infrastructure is at an ever increased risk of cyber attacks as hackers make them their prime target.
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
This paper discusses the emerging issue of Board of Directors Governance and Cybersecurity. Originally presented to the Boards of Directors of the IRC http://www.isorto.org/Pages/Home in May 2014. The paper is in a continuous improvement mode ultimately targeting being a resource for Boards of Directors in the energy (electricity and natural gas) industry. Suggested updates and improvements are welcome at PaulFeldman@Gmail.com The current copy is always at http://www.EnergyCollection.us/456.pdf
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
-The Current Global Digital Threat Climate
-Cyber-Trends Against The U.S. Financial Service Sector
-Considerations Prior To Outsourcing
-Pitfalls In International Partnerships
-Communications, Connections, And Security Considerations Between Locations
-Dealing With Data Exposures
-5 Things You Can Do To Protect Your Existing Outsourcing Right Now
Session 2 10:30am-11:30am
-Technology Outsourcing Trends
-Secure Outsourcing Technologies
-Collaboration Methods With Remote Teams
-How To Connect People With The Right Information At The Right Time And The Right Place
-How To Connect People With Fellow Employees, Vendors, Partners Or Other External Contacts Outside Of the Organization
-Project Management Technology Of Remote Resources
A business's network assets are critical to its success. Despite their overwhelming importance, however, too many businesses leave those assets to chance.
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...Levi Shapiro
Presentation by Mary Alice Annecharico, former CIO, Henry Ford Health System: Cyber Risk in Healthcare. Some of the issues discussed include Building a Culture of Confidentiality, Executive leadership engagement, Board of Director sponsorship, Institutional Stressors that encircle all cyber-risk issues, the Clinical mission, CMS cuts, Revenue downturns, budget cuts, availability of funding for priorities. Assessing and Managing Cyber-risk, etc.
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Saidot
Meeri Haataja's keyote 'When AI Meets Ethics' at Keväthumaus 2019 / Spring Splash 2019 (organised by Väestörekisterikeskus / Population Register Centre).
Sans 20 CSC: Connecting Security to the Business MissionTripwire
You know the old break-up line, “it’s not you, it’s me….”? As a CISO, what if when you get your few minutes to discuss security with the C-suite, board of directors or mission leadership, it really turns out to be you not them who failed in the communication?
Lack of success in communicating with your C-suite could lead to a breakup sooner or later. I’ve had hundreds of conversations with and about CISOs communicating – - on topics ranging from security breach information, status, performance metrics, risk, visualizations, or overall security posture with their executive leadership.
And largely, it turns out to be no surprise that communicating security information is incredibly difficult, especially with non-technical, disinterested, or time-constrained C-suite executives.
Success with SANS
The initial UMASS Security Program was based on the ISO/IEC 27002 controls framework, then starting in 2011, the SANS 20 CSC were added. Today’s program includes both. The ISO controls focus on program management, compliance and process from an IT auditor’s perspective, while the SANS controls focus on technology means they are better aligned with IT operations.
Prior to 2011, Wilson was having difficulty communicating with executive management (CIOs and others) – it was difficult to translate the purchase and implementation issues surrounding firewalls, anti-virus, and vulnerability scanning into easily familiar business terms and concepts relevant to management and process.
However, when he ditched trying to explain the ISO/IEC 27002 security controls framework in favor of using the SANS 20 CSC, he was able to communicate much more effectively with his C-suite for the first time in a way they could absorb and support.
In addition, he and his team have been able to map out a measurable and actionable security program based on SANS that he regularly succeeds in communicating to his executive team.
How to measure your cybersecurity performanceAbhishek Sood
In order for organizations to stay competitive, they must always be improving. This too is true for their cybersecurity.
Being able to properly harvest and digest cybersecurity benchmarking information is critical for today’s CIOs. If you realize that your cybersecurity is not at the level it should be, evaluating it properly can help you raise appropriate resources to fix the issues.
Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Adobe conducted a first-of-its-kind survey of more than 500 private and public sector cybersecurity professionals in the United States to explore their awareness and understanding of public policy developments and gauge how those public policy developments impact their jobs on a daily basis.
Coronavirus has created new challenges for global IT teams. Join our experts to learn about the four areas of enterprise risk brought about by this global pandemic and what your IT team can do to lessen your exposure and limit the financial fallout.
Responsible AI: An Example AI Development Process with Focus on Risks and Con...Patrick Van Renterghem
Organisations need to make sure that they use AI in an appropriate way. Martijn and Hugo explain how to ensure that the developments are ethically sound and comply with regulations, how to have end-to-end governance, and how to address bias and fairness, interpretability and explainability, and robustness and security.
During the conference, we looked at an example AI development process with focussing on the risks to be managed and the controls that can be established.
This paper examines the increased complexity of the healthcare industry, fueled by increasing reliance on automation, information technology, and the changing regulatory and reform environment. Healthcare organizations face an environment characterized by rapid changes in mandates, technology, and stakeholder expectations, all of which combine to increase the consequences of historical risks and generate new risks. Existing informal, siloed, and reactive risk management processes cannot effectively identify and manage the greatest, strategic-level risks facing the industry. Through years of working with commercial and government clients, Booz Allen Hamilton, a leading strategy and technology consulting firm, has developed a proven strategic risk management methodology to ensure the effective management of these strategic risks.
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
Learn how cognitive security may be a powerful tool in addressing challenges security professionals face.
New capabilities for a
challenging era
Security leaders are working to address three gaps
in their current capabilities
—
in intelligence, speed
and accuracy. Some organizations are beginning to
explore the potential of cognitive security solutions
to address these gaps and get ahead of their risks
and threats. There are high expectations for this
technology. Fifty-seven percent of the security
leaders we surveyed believe that it can significantly
slow the ef forts of cybercriminals. The 22 percent of
respondents who we call “Primed” have started their
journey into the cognitive era of cybersecurity
—
they
believe they have the familiarity, the maturity and the
resources they need. To begin the journey, it is
important to explore your weaknesses, determine
how you want to augment your capabilities with
cognitive solutions and think about building education
and investment plans for your stakeholders.
190 compliance, risk, and control specialists participated in our class on cyber compliance at the IE Law School. I presented good practices and tips to comply with regulations involving data security, computer crime, corporate defense, IT and compliance controls, and sectorial requirements
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.
Within this slide deck, we look at each of data protection trends, helping you define your organization’s best practice guide to address the top concerns. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Re...Steve Miller, CFA
ChainLink is a project with a clear use case driven by market demand. Supported by a strong team and an engaged community. These positive factors are undermined by opaque distribution and minimal decentralization. Resulting in a token score of 33 out of 50.
When data that is critical to cybersecurity tools remains in silos, everyone loses. This siloed approach diminishes the value of the data and leaves organizations with incomplete visibility, significant management overhead, and uncertainty about which security tools are actually necessary to ingest and analyze the data to protect the business.
These slides--based on the webinar--help answer the following questions:
- Which cybersecurity tools are necessary for full internal and external coverage, and which are redundant or outdated?
-What are the signs that a vendor can back up their promises, or that they’re exaggerating their product’s capabilities?
-How can you leverage machine learning to reduce security response time?
- How can you combine the strengths of a big data model with adaptive machine learning for more accurate, effective security protection and detection capabilities?
An increasing number of cyber attacks o public and private sector organizations has created an economic "ripple effect" across the globe. To solve this urgent issue, organizations need to recruit, build and train a cyber security workforce of IT professionals that can keep up with sophisticated security threats.
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Saidot
Meeri Haataja's keyote 'When AI Meets Ethics' at Keväthumaus 2019 / Spring Splash 2019 (organised by Väestörekisterikeskus / Population Register Centre).
Sans 20 CSC: Connecting Security to the Business MissionTripwire
You know the old break-up line, “it’s not you, it’s me….”? As a CISO, what if when you get your few minutes to discuss security with the C-suite, board of directors or mission leadership, it really turns out to be you not them who failed in the communication?
Lack of success in communicating with your C-suite could lead to a breakup sooner or later. I’ve had hundreds of conversations with and about CISOs communicating – - on topics ranging from security breach information, status, performance metrics, risk, visualizations, or overall security posture with their executive leadership.
And largely, it turns out to be no surprise that communicating security information is incredibly difficult, especially with non-technical, disinterested, or time-constrained C-suite executives.
Success with SANS
The initial UMASS Security Program was based on the ISO/IEC 27002 controls framework, then starting in 2011, the SANS 20 CSC were added. Today’s program includes both. The ISO controls focus on program management, compliance and process from an IT auditor’s perspective, while the SANS controls focus on technology means they are better aligned with IT operations.
Prior to 2011, Wilson was having difficulty communicating with executive management (CIOs and others) – it was difficult to translate the purchase and implementation issues surrounding firewalls, anti-virus, and vulnerability scanning into easily familiar business terms and concepts relevant to management and process.
However, when he ditched trying to explain the ISO/IEC 27002 security controls framework in favor of using the SANS 20 CSC, he was able to communicate much more effectively with his C-suite for the first time in a way they could absorb and support.
In addition, he and his team have been able to map out a measurable and actionable security program based on SANS that he regularly succeeds in communicating to his executive team.
How to measure your cybersecurity performanceAbhishek Sood
In order for organizations to stay competitive, they must always be improving. This too is true for their cybersecurity.
Being able to properly harvest and digest cybersecurity benchmarking information is critical for today’s CIOs. If you realize that your cybersecurity is not at the level it should be, evaluating it properly can help you raise appropriate resources to fix the issues.
Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Adobe conducted a first-of-its-kind survey of more than 500 private and public sector cybersecurity professionals in the United States to explore their awareness and understanding of public policy developments and gauge how those public policy developments impact their jobs on a daily basis.
Coronavirus has created new challenges for global IT teams. Join our experts to learn about the four areas of enterprise risk brought about by this global pandemic and what your IT team can do to lessen your exposure and limit the financial fallout.
Responsible AI: An Example AI Development Process with Focus on Risks and Con...Patrick Van Renterghem
Organisations need to make sure that they use AI in an appropriate way. Martijn and Hugo explain how to ensure that the developments are ethically sound and comply with regulations, how to have end-to-end governance, and how to address bias and fairness, interpretability and explainability, and robustness and security.
During the conference, we looked at an example AI development process with focussing on the risks to be managed and the controls that can be established.
This paper examines the increased complexity of the healthcare industry, fueled by increasing reliance on automation, information technology, and the changing regulatory and reform environment. Healthcare organizations face an environment characterized by rapid changes in mandates, technology, and stakeholder expectations, all of which combine to increase the consequences of historical risks and generate new risks. Existing informal, siloed, and reactive risk management processes cannot effectively identify and manage the greatest, strategic-level risks facing the industry. Through years of working with commercial and government clients, Booz Allen Hamilton, a leading strategy and technology consulting firm, has developed a proven strategic risk management methodology to ensure the effective management of these strategic risks.
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
Learn how cognitive security may be a powerful tool in addressing challenges security professionals face.
New capabilities for a
challenging era
Security leaders are working to address three gaps
in their current capabilities
—
in intelligence, speed
and accuracy. Some organizations are beginning to
explore the potential of cognitive security solutions
to address these gaps and get ahead of their risks
and threats. There are high expectations for this
technology. Fifty-seven percent of the security
leaders we surveyed believe that it can significantly
slow the ef forts of cybercriminals. The 22 percent of
respondents who we call “Primed” have started their
journey into the cognitive era of cybersecurity
—
they
believe they have the familiarity, the maturity and the
resources they need. To begin the journey, it is
important to explore your weaknesses, determine
how you want to augment your capabilities with
cognitive solutions and think about building education
and investment plans for your stakeholders.
190 compliance, risk, and control specialists participated in our class on cyber compliance at the IE Law School. I presented good practices and tips to comply with regulations involving data security, computer crime, corporate defense, IT and compliance controls, and sectorial requirements
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.
Within this slide deck, we look at each of data protection trends, helping you define your organization’s best practice guide to address the top concerns. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
Get it Together: ChainLink Securely Tying Smart Contracts to the Data They Re...Steve Miller, CFA
ChainLink is a project with a clear use case driven by market demand. Supported by a strong team and an engaged community. These positive factors are undermined by opaque distribution and minimal decentralization. Resulting in a token score of 33 out of 50.
When data that is critical to cybersecurity tools remains in silos, everyone loses. This siloed approach diminishes the value of the data and leaves organizations with incomplete visibility, significant management overhead, and uncertainty about which security tools are actually necessary to ingest and analyze the data to protect the business.
These slides--based on the webinar--help answer the following questions:
- Which cybersecurity tools are necessary for full internal and external coverage, and which are redundant or outdated?
-What are the signs that a vendor can back up their promises, or that they’re exaggerating their product’s capabilities?
-How can you leverage machine learning to reduce security response time?
- How can you combine the strengths of a big data model with adaptive machine learning for more accurate, effective security protection and detection capabilities?
An increasing number of cyber attacks o public and private sector organizations has created an economic "ripple effect" across the globe. To solve this urgent issue, organizations need to recruit, build and train a cyber security workforce of IT professionals that can keep up with sophisticated security threats.
Fintech 2017 Vision and Insight - MIT Enterprise Forum PolandGrow VC Group
Presentation for the fintech audience at MIT Enterprise Forum in Warsaw. The presentation illustrated three key areas of fintech: 1) Distributed Finance, 2) Open API Ecosystems, 3) Software Bankers.
Communication and media response to the Westminster AttackStephen Waddington
Best practice communication was critical to allaying fear in the immediate response to the Westminster attacks but sensationalist media coverage must be challenged.
There was a terrorist attack on Westminster Bridge and the Palace of Westminster in London yesterday. Five people, including a police office, are dead, and 40 people are injured.
In this deck I've looked at the response from London's Mayor, the police, journalists, media, the government, the public, and others. It is intended for a lecture to public relations students at Newcastle University.
The deck tells the story of how crisis situations have unfolded in media over the last 40 years, as media has changed.
I've included user generated comment from social networks including some examples of hate and propaganda that you may find disturbing.
Thank you to the emergency services, NHS staff and all the professional communicators involved in the incident response.
AI Governance and Ethics - Industry StandardsAnsgar Koene
Presentation on the potential for Ethics based Industry Standards to function as vehicle to address socio-technical challenges from AI.
Presentation given at the the 1st Austrian IFIP forum ono "AI and future society".
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
In this presentation, special guest Joseph Blankenship, principal analyst at Forrester, joined Interset CTO Stephan Jou and Security Strategist Paul Reid for a discussion on how to practically and effectively boost the IQ of your security arsenal with behavioral analytics so you can find threats faster than ever.
Learn more at Interset.AI
Operationalizing Big Data Security Analytics - IANS Forum DallasInterset
At IANS Forum Dallas, Interset CTO Stephan Jou discussed how Interset's AI-enabled security analytics platform can connect organizations' fragmented security ecosystems and distill billions of events from across the enterprise into a handful of prioritized, high-quality security leads that security teams can focus on.
Role of AI Safety Institutes in Trustworthy AI.pdfBob Marcus
Describes possible role of AI Safety Institutes collaborating to enable trustworthy AI. The key areas are External Red Team Testing and Incident Tracking Databases
Accenture 2017 Global Risk Study: Capital Markets Summaryaccenture
Since 2009, Accenture has conducted regular research into risk management. The 2017 Global Risk Study reveals how continued evolution in capital markets presents new risks—as well as new opportunities. View the summary presentation. Learn more about Capital Markets results from the 2017 Global Risk Study: https://accntu.re/2w54j1R
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
A New Approach to Threat Detection: Big Data Security Analytics Interset
Learn how to distill billions of events into a handful of security leads. Security analytics powered by machine learning is proven to make your SOC more efficient. This presentation includes four case studies.
Incidents - The Shorter, the Better with the Quality Engineering DisciplineAntoine Craske
Another frustrating day full of incidents. Everything that was planned had to be shifted to handle various incidents, even having to ignore some.
Despite having incident management in place, the volume of anomalies leaves us with challenges to solve. With this abnormal volume of anomalies, which incidents to handle, which to ignore? Who is in the best position to handle them? How do we sort out the false positives? How do we organize to turn things around quickly?
The Accelerate report identifies that organizations that are able to master a continuous and stable software iteration flow are the ones that make the difference in the market. For the others, incidents will remain their daily routine until their available resources are exhausted.
This presentation shares a methodology to bring your incident flow under control, at the cost of some sacrifice and courage.
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Ansgar Koene
This was a half-day UnBias project workshop at the WebSci'17 conference presenting some of the interim UnBias project results and engaging the audience in debate on issues related to the role of algorithms in mediated access to online information.
Data Connectors San Antonio Cybersecurity Conference 2018Interset
In this presentation, Interset Principal Data Scientist Roy Wilds dives into examples of how companies have successfully deployed security analytics. He also addresses how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results.
Cyber threat intelligence CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool. However, this sharing and accessibility present new challenges that result in increased CTI data, which must be analyzed and processed.
In this research, Enterprise Management Associates set out to discover which CTI sources, methods, and integrations are currently working in the industry and where there is room for improvement. The research provides key insights on the methods organizations are having the most success with and how organizations can better leverage CTI in their everyday operations.
How to Operationalize Big Data Security AnalyticsInterset
"Analysis" and "analytics" tools are not interchangeable. Here's how to accelerate threat-detection activities with a strategic, holistic security analytics solution. (For more information, visit Interset.com.)
How to Operationalize Big Data Security AnalyticsInterset
Analytics tools and analysis tools are not the same. Here is how to accelerate threat-detection activities with a holistic, strategic security-analytics solution.
Trust, Context and, Regulation: Achieving More Explainable AI in Financial Se...Databricks
This presentation seeks to advance the thinking on how financial services firms can implement a framework that supports explainable artificial intelligence (AI), thus building trust among consumers, shareholders and other stakeholders, and helping ensure compliance with emerging regulatory and ethical norms.
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsInterset
Interset CTO Stephan Jou joins Holger Schulze, CEO at Cybersecurity Insiders, to discuss the impact of insider attacks and how AI can be used to mitigate these threats. To watch the webinar recording, click here: https://register.gotowebinar.com/register/2916777136713869315
Want to learn more about the risks of insider threats? Check out highlights from the 2018 Insider Threat Report: https://www.slideshare.net/Interset/2018-insider-threat-report-infographic
The Myths + Realities of Machine-Learning CybersecurityInterset
Dr. Chase Cunningham, Principal Analyst at Forrester Research, joined Interset’s CTO, Stephan Jou, for a chat about what machine learning means and how enterprises can successfully deploy security analytics strengthened by this type of artificial intelligence. (For more information, visit Interset.com.)
Machine Learning: Addressing the Disillusionment to Bring Actual Business Ben...Jon Mead
'Machine learning’ is one of those cringy phrases, almost (if not already) taboo in the world of high-tech SaaS. Applying true machine learning to an organization’s product(s), however, can have real benefit for the business, its clients, and the industry as a whole. From credit card fraud investigations to the way that a car is built, machine learning has permeated our everyday life without a common understanding of what it is and how to implement it.
Machine learning is permeating our world. As it gains wider adoption, what does it mean for assurance professionals? This session will help you cut through the buzzwords and discover how machine learning can be leveraged in audit and compliance.
After completing this session, you will be able to:
Understand the two groups of algorithms
Understand the machine learning process
Describe use cases in assurance and compliance
Know where to learn more about machine learning
Similar to “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” (20)
Teaching cognitive computing with ibm watsondiannepatricia
Ralph Badinelli, Lenz Chair in the Department of Business Information Technology, Pamplin College of Business of Virginia Tech. presented "Teaching Cognitive Computing with IBM Watson" as part of the Cognitive Systems Institute Speaker Series.
Cognitive systems institute talk 8 june 2017 - v.1.0diannepatricia
José Hernández-Orallo, Full Professor, Department of Information Systems and Computation at the Universitat Politecnica de València, presentation “Evaluating Cognitive Systems: Task-oriented or Ability-oriented?” as part of the Cognitive Systems Institute Speaker Series.
Building Compassionate Conversational Systemsdiannepatricia
Rama Akkiraju, Distinguished Engineer and Master Inventor at IBM, presention "Building Compassionate Conversational Systems" as part of the Cognitive Systems Institute Speaker Series.
“Artificial Intelligence, Cognitive Computing and Innovating in Practice”diannepatricia
Cristina Mele, Full Professor of Management at the University of Napoli “Federico II”, presentation as part of Cognitive Systems Institute Speaker Series
Eric Manser and Will Scott from IBM Research, presentation on "Cognitive Insights Drive Self-driving Accessibility" as part of the Cognitive Systems Institute Speaker Series
Roberto Sicconi and Malgorzata (Maggie) Stys, founders of TeleLingo, presented "AI in the Car" as part of the Cognitive Systems Institute Speaker Series.
“Semantic PDF Processing & Document Representation”diannepatricia
Sridhar Iyengar, IBM Distinguished Engineer at the IBM T. J. Watson Research Center, presention “Semantic PDF Processing & Document Representation” as part of the Cognitive Systems Institute Group Speaker Series.
Joining Industry and Students for Cognitive Solutions at Karlsruhe Services R...diannepatricia
Gerhard Satzger, Director of the Karlsruhe Service Research Institute and two former students and IBMers, Sebastian Hirschl and Kathrin Fitzer, presention"Joining Industry and Students for Cognitive Solutions at Karlsruhe Services Research Center" as part of the Cognitive Systems Institute Speaker Series.
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
Dr. Mark Sherman, Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. , presention “Experiences Developing an IBM Watson Cognitive Processing Application to Support Q&A of Application Security Diagnostics” as part of the Cognitive Systems Institute Speaker Series.
From complex Systems to Networks: Discovering and Modeling the Correct Network"diannepatricia
From complex Systems to Networks: Discovering and Modeling the Correct Network" by Nitesh Chawla as part of the Cognitive Systems Institute Speaker Series
Nitesh Chawla is the Frank M. Freimann Professor of Computer Science and Engineering, and director of the research center on network and data sciences (iCeNSA) at the University of Notre Dame.
Developing Cognitive Systems to Support Team Cognitiondiannepatricia
Steve Fiore from the University of Central Florida presented “Developing Cognitive Systems to Support Team Cognition” as part of the Cognitive Systems Institute Speaker Series
Kevin Sullivan from the University of Virginia presented: "Cyber-Social Learning Systems: Take-Aways from First Community Computing Consortium Workshop on Cyber-Social Learning Systems" as part of the Cognitive Systems Institute Speaker Series.
“IT Technology Trends in 2017… and Beyond”diannepatricia
William Chamberlin, IBM Distinguished Market Intelligence Professional, presented “IT Technology Trends in 2017… and Beyond” as part of the Cognitive Systems Institute Speaker Series on January 26, 2017.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.